General

  • Target

    2024-02-12_0ea1235b82fdece80e3b644e1ea14675_cryptolocker

  • Size

    46KB

  • MD5

    0ea1235b82fdece80e3b644e1ea14675

  • SHA1

    7af90566f7a01ec1bb835299253af0d672690c60

  • SHA256

    db954fe95da7580c764984a77ed72c6ae3f1a32e5b984f7612a1c4d802fa59be

  • SHA512

    9d45bfd0e312896fd210f46bd6f2863419c32e171effb59a6dfb6c6aea3e97a45b0d4d571759faf2b427a2ec0d78ee4b4f06f8c61d2957a87a1214f92fb083b7

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2R:qmbhXDmjr5MOtEvwDpj5cDtKkQZQO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_0ea1235b82fdece80e3b644e1ea14675_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections